Tchater maintenant avec le support
Tchattez avec un ingénieur du support

Active Roles 7.6.1 - Administration Guide

Introduction About Active Roles Getting Started Rule-based Administrative Views Role-based Administration
Access Templates as administrative roles Access Template management tasks Examples of use Deployment considerations Windows claims-based Access Rules
Rule-based AutoProvisioning and Deprovisioning
About Policy Objects Policy Object management tasks Policy configuration tasks
Property Generation and Validation User Logon Name Generation Group Membership AutoProvisioning E-mail Alias Generation Exchange Mailbox AutoProvisioning AutoProvisioning for SaaS products OneDrive Provisioning Home Folder AutoProvisioning Script Execution Office 365 and Azure Tenant Selection User Account Deprovisioning Office 365 Licenses Retention Group Membership Removal Exchange Mailbox Deprovisioning Home Folder Deprovisioning User Account Relocation User Account Permanent Deletion Group Object Deprovisioning Group Object Relocation Group Object Permanent Deletion Notification Distribution Report Distribution
Deployment considerations Checking for policy compliance Deprovisioning users or groups Restoring deprovisioned users or groups Container Deletion Prevention policy Picture management rules Policy extensions
Workflows
Understanding workflow Workflow activities overview Configuring a workflow
Creating a workflow definition Configuring workflow start conditions Configuring workflow parameters Adding activities to a workflow Configuring an Approval activity Configuring a Notification activity Configuring a Script activity Configuring an If-Else activity Configuring a Stop/Break activity Configuring an Add Report Section activity Configuring a Search activity Configuring CRUD activities Configuring a Save Object Properties activity Configuring a Modify Requested Changes activity Enabling or disabling an activity Enabling or disabling a workflow Using the initialization script
Example: Approval workflow E-mail based approval Automation workflow Activity extensions
Temporal Group Memberships Group Family Dynamic Groups Active Roles Reporting Management History
Understanding Management History Management History configuration Viewing change history
Workflow activity report sections Policy report items Active Roles internal policy report items
Examining user activity
Entitlement Profile Recycle Bin AD LDS Data Management One Identity Starling Management Managing One Identity Starling Connect Configuring linked mailboxes with Exchange Resource Forest Management Configuring remote mailboxes for on-premises users Azure AD, Office 365, and Exchange Online management
Configuring Active Roles to manage hybrid AD objects Managing Hybrid AD Users Unified provisioning policy for Azure O365 Tenant Selection, Office 365 License Selection, and Office 365 Roles Selection, and OneDrive provisioning Office 365 roles management for hybrid environment users Managing Office 365 Contacts Managing Hybrid AD Groups Managing Office 365 Groups Managing Azure Security Groups Managing cloud-only distribution groups Managing cloud-only Azure users Managing cloud-only Azure guest users Managing cloud-only Azure contacts Changes to Active Roles policies for cloud-only Azure objects Managing room mailboxes Managing cloud-only shared mailboxes
Managing Configuration of Active Roles
Connecting to the Administration Service Adding and removing managed domains Using unmanaged domains Evaluating product usage Creating and using virtual attributes Examining client sessions Monitoring performance Customizing the console Using Configuration Center Changing the Active Roles Admin account Enabling or disabling diagnostic logs Active Roles Log Viewer
SQL Server Replication Appendix A: Using regular expressions Appendix B: Administrative Template Appendix C: Communication ports Appendix D: Active Roles and supported Azure environments Appendix E: Active Roles integration with other One Identity and Quest products Appendix F: Active Roles integration with Duo Appendix G: Active Roles integration with Okta

Configuration Center design elements

Configuration Center is composed of the following elements:

  • Initial configuration wizards  After completing Active Roles Setup, the administrator uses the initial configuration wizards to create a new Active Roles instance, including the Administration Service and Web Interface. The wizards allow you to specify, in a logical manner, all the required configuration settings.
  • Hub pages and management wizards  Once initial configuration has been completed, Configuration Center provides a consolidated view of the core Active Roles configuration settings, and offers tools for changing those settings. Hub pages in the Configuration Center main window display the current settings specific to the Administration Service and Web Interface, and include commands to start management wizards for changing those settings.
  • From the Administration Service page, you can view or change the service account, Active Roles and Admin account; configure the Active Roles Configuration Database and the Management history database; import configuration data or management history data from an Active Roles database of an earlier version or the current version; view status information, such as whether the Administration Service is started and ready for use; start, stop or restart the Administration Service.

    By allowing configuration data to be imported at any convenient time, Configuration Center makes Active Roles much easier to upgrade. You can install the new Administration Service version side-by-side with an earlier version and then import configuration data to the new version as needed.

  • From the Web Interface page, you can view, create, modify, delete Web Interface sites, enable force SSL redirection, and configure authentication settings; export configuration of any existing Web Interface site to a file; open each site in a Web browser. The site parameters available for setting, viewing and changing include the site’s address (URL, which is based on the Web site and alias of the Web application that implements the Web Interface site on the Web server) and the configuration object that stores the site’s configuration data on the Administration Service. When creating or modifying a Web Interface site, you can reuse an existing configuration object, or create a new configuration object based on a template or by importing data from another configuration object or from an export file.

    Wizards that start from hub pages help you manage configuration settings. Management wizards streamline the core configuration tasks by reducing time it takes to change the service account, Active Roles Admin account and database; import configuration and management history; and configure Web Interface sites on the Web server.

  • From the Join to One Identity Starling wizard, you can enable Active Roles to connect to One Identity Starling, the Software as a Service (SaaS) solution of One Identity.
  • From the MMC Interface Access wizard, you can manage the settings for enabling or disabling user login to MMC interface.
  • Configuration Shell  Active Roles Management Shell enables access to all Configuration Center features and functions from a command line or from a script, allowing for unattended configuration of Active Roles components. The Windows PowerShell module named ActiveRolesConfiguration provides cmdlets for the key set of configuration tasks, such as creation of the Active Roles database, creation or modification of Administration Service instances and Web Interface sites, data exchange between Active Roles databases and between site configuration objects, querying the current state of the Administration Service, and starting, stopping or restarting the Administration Service. The cmdlets provided by the ActiveRolesConfiguration module have their noun prefixed with AR, such as New-ARDatabase, Set-ARService, or Set-ARWebSite.

Configuring a local or remote Active Roles instance

Configuring a local or remote Active Roles instance

Configuration Center is installed as part of the Management Tools component when you install Active Roles on a 64-bit (x64) system. You can use this tool to perform configuration tasks on the local or remote computer that has the current version of the Administration Service or Web Interface installed. Configuration Center looks for these components on the local computer and, if no components has been found, prompts you to connect to a remote computer. Another way to connect to a remote computer is by using the menu on the heading bar at the top of the Configuration Center main window.

When connecting to a remote computer, Configuration Center prompts you for a user name and password. This must be the name and password of a domain user account that belongs to the Administrators group on the remote computer. In addition, whether you are going to perform configuration tasks on the local computer or on a remote computer, your logon account must be a member of the Administrators group on the computer running Configuration Center.

To perform configuration tasks on a remote computer, Configuration Center requires Windows PowerShell remoting to be enabled on that computer. Run the Enable-PSRemoting command in the PowerShell console to enable remoting (see the Enable-PSRemoting help topic at http://go.microsoft.com/fwlink/?LinkID=144300 for further details). On Windows Server 2016 or later, remoting is enabled by default.

Running Configuration Center

Configuration Center is installed and, by default, automatically started after you install the Administration Service or Web Interface, allowing you to perform initial configuration tasks on the computer on which you have installed those components. If you close Configuration Center and want to start it again, you can start Configuration Center from the following locations:

  • On Windows Server 2016 or later, click the Active Roles 7.6.1 Configuration Center tile on the Apps page.

As Configuration Center can manage Active Roles not only on the local computer but also on remote computers, it is possible to use it on a client operating system as well as on server operating systems. You can install Configuration Center by installing Active Roles Management Tools on a 64-bit (x64) server or client operating system, and then connect it to a remote computer on which the Administration Service or Web Interface is installed. To start Configuration Center on a client operating system:

  • On Windows 7, select Start | All Programs | One Identity Active Roles 7.6.1 | Active Roles 7.6.1 Configuration Center.
  • On Windows 8 or later, click the Active Roles 7.6.1 Configuration Center tile on the Apps page.

Pre-requisites to run the Configuration Center

To run Configuration Center on a given computer, you must be logged on with a user account that has administrator rights on that computer.

If neither the Administration Service nor the Web Interface is installed on the local computer, then Configuration Center prompts you to select a remote computer. In the Select Server dialog box that appears, supply the fully qualified domain name of a server, on which the Administration Service or the Web Interface (or both) is installed, and type the logon name and password of a domain user account that has administrator rights on that server. You can connect to a remote server at any time by selecting the Connect to another server command from the menu on the heading bar at the top of the Configuration Center main window, which also displays the Select Server dialog box.

Before launching Configuration Center, it is recommended to perform the following steps:

  1. On the system where Active Roles is installed, browse to C:\Program Files\One Identity\Active Roles\7.6.1\Shell.
  2. Right click on the ActiveRolesServiceConfiguration.psm1 file and select Properties.
  3. On the ActiveRolesServiceConfiguration Properties dialog box, click Digital Signatures->Details.
  4. On the Digital Signatures Details dialog box, click View Certificate.
  5. On the Certificate dialog box, click Install Certificate….
  6. On the Certificate Import Wizard dialog box, from the Store Location select Local Machine and click Next.
  7. On the Certificate Store section, select Place all certificates in the following store and click Browse.
  8. On the Select Certificate Store dialog box, select Trusted Publishers and click OK.

    The Certificate store field is populated with the selected store name.

  1. Click Next.

The Certificate Import Wizard displays the selected certificate store.

  1. Click Finish.

    The Certificate Import Wizard displays a message indicating that the import was successful.

NOTE: If the Certificates from Trusted Publishers are not installed on the system on which Active Roles is installed, then the Configuration Center may not launch successfully.

Documents connexes

The document was helpful.

Sélectionner une évaluation

I easily found the information I needed.

Sélectionner une évaluation